Table of Contents
A Performance of Computational Intelligence for Security in Wireless Networks
Download PDF Pages (CM-35 - CM-45)
|
Privacy-Preserving for E-Healthcare System Based on Fog Computing Using Encryption Techniques
Download PDF Pages (CM-26 - CM-34)
|
Heuristic Algorithms for Mobile Edge Computing Recovery System Based on Ad-Hoc Relay Nodes
Download PDF Pages (CM-17 - CM-25)
|
A New and Repeatable Software Stop Testing Methodology
Download PDF Pages (CM-9 - CM-16)
|
Multiple Server Queuing System to Analyze the Finite Queue Length
Download PDF Pages (CM-1 - CM-8)
|